TROYANOSYVIRUS
Voltar para CVEs

CVE-2026-1323

N/A

Descricao

The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'].

Detalhes CVE

Pontuacao CVSS v3.1N/A
Publicado3/17/2026
Ultima modificacao3/17/2026
Fontenvd
Avistamentos honeypot0

Fraquezas (CWE)

CWE-502

Referencias

https://typo3.org/security/advisory/typo3-ext-sa-2026-005(f4fb688c-4412-4426-b4b8-421ecf27b14a)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.